In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modeling the anonymity of a database table and we prove that n-confusion is a generalization of k-anonymity. After a short survey on the different available definitions of k-anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the correct definition. We provide a description of the k-anonymous graphs, both for the regular and the non-regular case. We also introduce the more flexible concept of (k, l)-anonymous graph. Our definition of (k, l)-anonymous graph is meant to replace a previous definition of (k, l)-anonymous graph, which we here prove to have severe weaknesses. Finally, we...
While knowledge graphs (KGs) are getting popular as they can formalize many types of users’ data in ...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be...
Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of...
We provide a new way for anonymising a heterogeneous graph containing personal identifiable informat...
Graph anonymisation aims at reducing the ability of an attacker to identify the nodes of a graph by ...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
In data privacy, the evaluation of the disclosure risk has to take into account the fact that severa...
Abstract—The concept of k-anonymity has received considerable attention due to the need of several o...
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-a...
Disclosure-control is a traditional statistical methodology for protecting pri-vacy when data is rel...
The problem of privacy-preserving data mining has attracted considerable attention in recent years b...
A range of privacy models as well as anonymization algorithms have been developed. In tabular micro ...
International audienceIn this paper, we consider the problem of anonymization on directed networks. ...
The technique of k-anonymization allows the releasing of databases that contain personal information...
While knowledge graphs (KGs) are getting popular as they can formalize many types of users’ data in ...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be...
Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of...
We provide a new way for anonymising a heterogeneous graph containing personal identifiable informat...
Graph anonymisation aims at reducing the ability of an attacker to identify the nodes of a graph by ...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
In data privacy, the evaluation of the disclosure risk has to take into account the fact that severa...
Abstract—The concept of k-anonymity has received considerable attention due to the need of several o...
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-a...
Disclosure-control is a traditional statistical methodology for protecting pri-vacy when data is rel...
The problem of privacy-preserving data mining has attracted considerable attention in recent years b...
A range of privacy models as well as anonymization algorithms have been developed. In tabular micro ...
International audienceIn this paper, we consider the problem of anonymization on directed networks. ...
The technique of k-anonymization allows the releasing of databases that contain personal information...
While knowledge graphs (KGs) are getting popular as they can formalize many types of users’ data in ...
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymi...
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be...